-
1
-
-
0002982976
-
Performance guarantees for approximation algorithms depending on parametrized triangle inequalities
-
T. Andreae and H. Bandelt. Performance guarantees for approximation algorithms depending on parametrized triangle inequalities. SIAM Journal of Discrete Mathematics, Vol.8, pp.1-16, 1995.
-
(1995)
SIAM Journal of Discrete Mathematics
, vol.8
, pp. 1-16
-
-
Andreae, T.1
Bandelt, H.2
-
2
-
-
3242761223
-
-
Personal Communication
-
D.W. Bauder. Personal Communication.
-
-
-
Bauder, D.W.1
-
3
-
-
3242809513
-
An anti-counterfeiting concept for currency systems
-
Sandia National Labs. Albuquerque, NM
-
D.W. Bauder. An Anti-Counterfeiting Concept for Currency Systems. Research report PTK-11990. Sandia National Labs. Albuquerque, NM, 1983.
-
(1983)
Research Report
, vol.PTK-11990
-
-
Bauder, D.W.1
-
4
-
-
3242746521
-
Machine reading of visual counterfeit deterrent features and summary of US research, 1980-90
-
Ottawa, Canada, Septemeber
-
S. Church and D. Littman. Machine reading of Visual Counterfeit Deterrent Features and Summary of US Research, 1980-90. Four Nation Group on Advanced Counterfeit Deterrence, Ottawa, Canada, Septemeber 1991.
-
(1991)
Four Nation Group on Advanced Counterfeit Deterrence
-
-
Church, S.1
Littman, D.2
-
5
-
-
0020097689
-
On the worst-case performance of some algorithms for the asymmetric traveling salesman problem
-
A.M. Frieze, G. Galbiati, and F. Maffioli. On the worst-case performance of some algorithms for the asymmetric traveling salesman problem. Networks, Vol.12, no.1, pp.23-39, 1982.
-
(1982)
Networks
, vol.12
, Issue.1
, pp. 23-39
-
-
Frieze, A.M.1
Galbiati, G.2
Maffioli, F.3
-
7
-
-
84976789814
-
Efficient algorithms for shortest paths in sparse networks
-
D.B. Johnson. Efficient algorithms for shortest paths in sparse networks. Journal of the ACM, Vol.24, no.1, pp.1-13, 1977.
-
(1977)
Journal of the ACM
, vol.24
, Issue.1
, pp. 1-13
-
-
Johnson, D.B.1
-
11
-
-
0018015137
-
Modeling by shortest data description
-
J. Rissanen. Modeling by Shortest Data Description. Automatica, Vol.14, pp.465-471, 1978.
-
(1978)
Automatica
, vol.14
, pp. 465-471
-
-
Rissanen, J.1
-
12
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. A. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, vol.21, no.2, pp.120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.A.3
-
13
-
-
84944486544
-
Prediction and entropy of printed English
-
C.E. Shannon. Prediction and entropy of printed English. Bell Systems Technical Journal, pp.50-64, 1951.
-
(1951)
Bell Systems Technical Journal
, pp. 50-64
-
-
Shannon, C.E.1
-
16
-
-
3242812593
-
A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes
-
Springer-Verlag
-
Y. Desmedt and A. Odlyzko. A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes. CRYPTO, Springer-Verlag, pp.516-522, 1985.
-
(1985)
CRYPTO
, pp. 516-522
-
-
Desmedt, Y.1
Odlyzko, A.2
-
17
-
-
84957693225
-
Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1
-
Springer-Verlag
-
D. Bleichenbacher. Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. CRYPTO, Springer-Verlag, pp.1-12, 1998.
-
(1998)
CRYPTO
, pp. 1-12
-
-
Bleichenbacher, D.1
-
18
-
-
84957066742
-
A new signature forgery strategy
-
Springer-Verlag
-
J.-S. Coron, D. Naccache, and J.P. Stern. A New Signature Forgery Strategy. CRYPTO, Springer-Verlag, pp.1-18, 1999.
-
(1999)
CRYPTO
, pp. 1-18
-
-
Coron, J.-S.1
Naccache, D.2
Stern, J.P.3
-
19
-
-
84947906522
-
The exact security of digital signatures: How to sign with RSA and Rabin
-
Springer-Verlag
-
M. Bellare and P. Rogaway. The exact security of digital signatures: how to sign with RSA and Rabin. EUROCRYPT, Springer-Verlag, pp.399-414, 1996.
-
(1996)
EUROCRYPT
, pp. 399-414
-
-
Bellare, M.1
Rogaway, P.2
|